共 16 条
- [1] Role-based access control. ANSI INCITS 359-2004, American National Standards Institute, International Committee for Information Technology Standards, 35, 6, pp. 37-50, (2004)
- [2] Burnett C., Chen L., Edwards P., Et al., TRAAC: trust and risk aware access control, IEEE PST, (2014)
- [3] Chen Y.R., Tian L.Q., Yang Y., Model and analysis of user behavior based on dynamic game theory in cloud computing, Acta Electron Sin, 39, 8, pp. 1818-1823, (2011)
- [4] Feng G.D., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, J Softw, 22, 1, pp. 71-83, (2011)
- [5] Information security technology—risk assessment specification for information security, (2007)
- [6] Josang A., Lo Presti S., Analysing the relationship between risk and trust, Trust Manag, 2, pp. 135-145, (2004)
- [7] Lin G., Wang D., Bie Y.Y., Et al., MTBAC: a mutual trust based access control model in cloud computing, China Commun, 11, 4, pp. 154-162, (2014)
- [8] Liu W., Duan H.X., Zhang H., Ren P., Wu J.P., TRBAC: trust based access control model, J Comput Res Dev, 48, 8, pp. 1414-1420, (2011)
- [9] Ma S.N., He J.S., Gao F., Zhang Y.Q., Access control model based on trust, Int J Digit Content Technol Appl, 5, 7, pp. 320-325, (2011)
- [10] Mahalle P.N., Thakre P., Prasad N.R., Et al., A fuzzy approach to trust based access control in internet of things, (2013)